Malware Noob Month Post #4
Does malware need to be written in C or C++?
No. You can write malware in any language you want. In fact, I encourage you to write malware in other programming languages.
The reason why C (or C++) is so common is because, as is tradition, it has some…
In light of the new course, I created a Discord server for MalwareAnalysisForHedghogs to discuss malware analysis related topics.
You can join here--this is for every malware enthusiast, not only course members:
discord.gg/3evhC4cj
This blog post about impostor certificates by @SquiblydooBlog is a gem and very relevant right now.
Or: How threat actors impersonate companies to obtain authenticode certificates for signing their malware.
And why revokation is important.
squiblydoo.blog/2024/05/13/imp…
dnpy - A Python library for reading .NET assemblies.
It's not finished yet, but its current state is sufficient for many tasks. Using only dnpy (without needing another project), you can parse a .NET assembly, iterate through its methods, and read its instructions.…
Some threat actors are bold enough to submit their malware as false positive to antivirus companies.
This also happened with AppSuite PDF Editor.
Our technical deep-dive is out 📝
gdatasoftware.com/blog/2025/08/3…#GDATA#GDATATechblog #AppSuite
#TamperedChef
SIE Europe passive dns analytics with UMAP clustering shows that the campaign is ~1000 domains and all domains on AWS. SW Signing certs is revoked and webpage certs changed to amazon.
All domains uploaded to UrlScan
(700k records analysed)
@JAMESWT_WT@struppigel
#Oyster Loader #MalwareAnalysis is out. Please let me know what you think, if it's helpful, and what needs to be improved on for the next one. Thanks to my colleagues for help on this and the heavy lifting. I learned a lot doing this.
www2.bluevoyant.com/OysterBackdoor…
Seeing a (potential new?) python-based backdoor we're tracking as #PyNightshade for the second time delivered via #ClickFix that uses sockets for C2. Supports several commands from C2, including: remote shell, uploading files from the victim host, and self-deletion. It uses RC4…
@nhegde610@struppigel In many cases, we’ve seen hosts infected for weeks or months.
In my tracking of certificates, I think this actor has been active for a few years pushing PUP-like files.
@struppigel Our SOC got multiple of these cases this week as well. All PDF-related. Most (if not all) cases have a delay of at least 10 days between initial execution of the downloaded software and execution of malicious .js files. (1/2)
240K Followers 200 FollowingBreaking cybersecurity and technology news, guides, and tutorials that help you get the most from your computer. DMs are open, so send us those tips!
89K Followers 910 FollowingProgrammer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
10K Followers 462 FollowingThreat Researcher at Check Point @_CPResearch_ #DFIR #Reversing - All opinions expressed here are mine only.
https://t.co/iWvwWF1AnN
60K Followers 1K FollowingSecurity information portal, testing and certification body.
Organisers of the annual Virus Bulletin conference. @[email protected]
73 Followers 2K FollowingINWPIA is the "Largest Private Investigator Association Network" in the State of Idaho. We are an Idaho Secretary of State Non-Profit 501(d). John 3:16-17
1K Followers 2K FollowingApplication Security Engineer • After all, we're all alike. • ☁️ AWS Community Builder • Founder of @hackalldaytr • Threema: https://t.co/H5fE73jmuJ
240K Followers 200 FollowingBreaking cybersecurity and technology news, guides, and tutorials that help you get the most from your computer. DMs are open, so send us those tips!
89K Followers 910 FollowingProgrammer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
63K Followers 82 FollowingThe latest research and news from Unit 42, the Palo Alto Networks (@paloaltontwks) Threat Intelligence and Security Consulting Team covering incident response.
10K Followers 462 FollowingThreat Researcher at Check Point @_CPResearch_ #DFIR #Reversing - All opinions expressed here are mine only.
https://t.co/iWvwWF1AnN
26 Followers 30 FollowingI track the trail of the spectral hounds. Investigating the digital ghosts that haunt the wire turning faint whispers in the dark into actionable intelligence.
13K Followers 281 FollowingThe leading MDR provider trusted by some of the world’s most renowned brands to expel adversaries, minimize risk, & build security resilience. https://t.co/uTjUcRDveB
8K Followers 132 FollowingWe are a hi-tech company focusing on binary software analysis. Our main products are IDA Pro and the Hex-Rays Decompiler.
Discourse: https://community.hex-rays
4K Followers 788 FollowingStay ahead of cyber threats. Get real-time alerts on notable APT/FIN/ORB indicators from VirusTotal. A threat intel project by @craiu.
330K Followers 620 FollowingConnecting police & catching criminals in 196 countries for more than a century. Report crimes to your local #police.
Follow our Secretary General @Interpol_SG
1K Followers 296 FollowingAn ellie waltman fanpage with a knack for breaking software. @[email protected] + https://t.co/QXhPParXGV. @greynoiseio snuggie owner. TWEETS MY OWN
5K Followers 95 FollowingChatGPT says I'm a cyber researcher :) | donate 💸 to g0njxa.eth 💖 | Bad student, enthusiast, defo not an expert
DMs are open, feel free to reach!
😼☂️🟣
14K Followers 915 FollowingWindows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses! 🚀 #WindowsInternals #TrainSec
2K Followers 413 FollowingThreat Intel Specialist and Incident Responder. Private account. All opinions expressed here are mine only.
https://t.co/7dQQO1JwUd
8K Followers 6K Following#InfoSec professional, husband & father of two (in random order). #BlueTeam #DFIR #APT #CTI #RedTeaming #BSidesZH (RT/Likes ≠ endorsement) 👀➡️#MalwareChallenge
1K Followers 422 FollowingThreat Intel Researcher.
Opinions are mine.
Special thanks to @censysio , @ValidinLLC & @ReversingLabs for making my research easier.